General

  • Target

    414c453b8a1e3e5a1f09b06b8d12ad76

  • Size

    431KB

  • Sample

    211102-kywhjahbcm

  • MD5

    414c453b8a1e3e5a1f09b06b8d12ad76

  • SHA1

    0c67387c0746d2df0b79acbf937bb636979c6a7c

  • SHA256

    422b03c3a614d7db59c9ce93ec53fda6c6ccb6233ebb822c998471a16e1a884e

  • SHA512

    d98046081fc499707a5b2c0bf677cc61a942cba8673481fef8cf95ab31b5b93e103d354a9d7fbf427d4008605165c4b6c0e255e0d3c686f785f98f972851bae9

Malware Config

Extracted

Family

raccoon

Botnet

68e2d75238f7c69859792d206401b6bde2b2515c

Attributes
  • url4cnc

    http://telegalive.top/agrybirdsgamerept

    http://toptelete.top/agrybirdsgamerept

    http://telegraf.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Targets

    • Target

      414c453b8a1e3e5a1f09b06b8d12ad76

    • Size

      431KB

    • MD5

      414c453b8a1e3e5a1f09b06b8d12ad76

    • SHA1

      0c67387c0746d2df0b79acbf937bb636979c6a7c

    • SHA256

      422b03c3a614d7db59c9ce93ec53fda6c6ccb6233ebb822c998471a16e1a884e

    • SHA512

      d98046081fc499707a5b2c0bf677cc61a942cba8673481fef8cf95ab31b5b93e103d354a9d7fbf427d4008605165c4b6c0e255e0d3c686f785f98f972851bae9

    • Raccoon

      Simple but powerful infostealer which was very active in 2019.

    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix

Tasks